Share This
Description
Almost every software application has users. In the online world, applications may have one or few users, if internal, or billions of users, if Facebook (hi Zuck!). Most applications customize functionality and the user interface for each user because of business rules or customer expectations.
Users are a fundamental entity. If you are building an application, you'll almost certainly have users. At FusionAuth, we've built a flexible auth system that makes managing users easy and secure. We talk to people about their auth systems every day and have helped plenty of folks migrate to FusionAuth from other systems, whether commercial, open source, or homegrown.
While modern auth systems can be quite complex, three pieces of functionality appear in almost every one: authentication, authorization and user management. When you are implementing an application, you can choose to build this functionality from scratch or use an existing auth system provider to outsource.
Much like you outsource your data management to a relational database system such as Postgresql, you can do the same with auth, with many of the same benefits.
This book will cover how to evaluate an auth system, risks you might encounter and how to mitigate them, and migration and implementation details.
Tag This Book
This Book Has Been Tagged
Our Recommendation
Notify Me When The Price...
Log In to track this book on eReaderIQ.
Track These Authors
Log In to track Cameron Pavey on eReaderIQ.
Log In to track Dan Moore on eReaderIQ.
Log In to track Daniel DeGroff on eReaderIQ.
Log In to track Eze Sunday Eze on eReaderIQ.
Log In to track James Hickey on eReaderIQ.
Log In to track Joe Stech on eReaderIQ.
Log In to track Keanan Koppenhaver on eReaderIQ.
Log In to track Matthew Fuller on eReaderIQ.
Log In to track Mihir Patel on eReaderIQ.